Sciweavers

1054 search results - page 178 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
CSMR
1998
IEEE
15 years 6 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
147
Voted
DAC
2004
ACM
15 years 5 months ago
Communication-efficient hardware acceleration for fast functional simulation
This paper presents new technology that accelerates system verification. Traditional methods for verifying functional designs are based on logic simulation, which becomes more tim...
Young-Il Kim, Woo-Seung Yang, Young-Su Kwon, Chong...
SPIEVIP
2008
15 years 4 months ago
Visual surveillance in maritime port facilities
In this work we propose a method for securing port facilities which uses a set of video cameras to automatically detect various vessel classes moving within buffer zones and off-l...
Mikel D. Rodriguez Sullivan, Mubarak Shah
WSCG
2000
131views more  WSCG 2000»
15 years 3 months ago
Dynamic Animation of N-Dimensional Deformable Objects
This paper presents a new, accurate, efficient and unified method for dynamic animation of one, two or three-dimensional deformable objects. The objects are modelled as d-dimensio...
Yannick Rémion, Jean-Michel Nourrit, Olivie...
AROBOTS
2006
174views more  AROBOTS 2006»
15 years 2 months ago
Area measurement of large closed regions with a mobile robot
How can a mobile robot measure the area of a closed region that is beyond its immediate sensing range? This problem, which we name as blind area measurement, is inspired from scout...
Erol Sahin, Sertan Girgin, Emre Ugur